Explain the changes to the ip stack, Computer Networking

Assignment Help:

After powering up his PC, Bob notices the PC was not able to properly connect to network devices. He obtained the following information from his workstation:

C:\>ipconfig

Windows IP Configuration

Ethernet adapter El90x1:

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 169.254.55.187

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. :

He called the IT department for help (he was on hold for 5 minutes). When the IT tech support person got on the phone, Bob's PC had already begun working properly. Bob then obtained the following information from his workstation.

C:\>ipconfig

Connection-specific DNS Suffix....:

IP Address. . . . . . . . ..................: 139.100.110.50

Subnet Mask . . . . . . ................. : 255.255.0.0

Default Gateway . . . ................. : 139.100.110.1

a. Explain in detail what occurred.

b. How can Bob account for the first IP stack entries?

c. How would you explain the changes to the IP stack?


Related Discussions:- Explain the changes to the ip stack

Enumerate the concept of ip address, Enumerate the concept of IP address ...

Enumerate the concept of IP address The router must have an IP address of the same network (194.62.15.x in this case) for the convenience of the entire network to use the servi

Describe virtual channel, What is virtual channel? Virtual channel is n...

What is virtual channel? Virtual channel is normally a connection from one source to one destination, although multicast connections are also allowed. The other name for virtua

Different technologies involved in establishing wan links, What are the dif...

What are the different technologies involved in establishing WAN links? Analog connections - using conventional telephone lines; Digital connections - using digital-grade telep

Banking industry, Will like to know what is the standard industrial practic...

Will like to know what is the standard industrial practice for a bank network design? Preferably with complete paper on the network design covering security, domain segregation, vi

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

How is final different from finally and finalize, How is final different fr...

How is final different from finally and finalize ()? Final is a modifier which can be applied to a class or a method or a variable. final class can't be inherited, final method

Distributed Algorithms, can we solve the problem using bounded buffer space...

can we solve the problem using bounded buffer space if the propagation delay is arbitrarily large ?

Name the connecting devices of bridges, Connecting Devices of bridges -...

Connecting Devices of bridges - Five kinds: - Repeaters - Hubs - Bridges - Two- and three-layer switches - Repeaters and hubs - layer one of Internet model -

Ajax, Ajax is a relatively new set of techniques that, in a sense, implemen...

Ajax is a relatively new set of techniques that, in a sense, implement some of the functionalities originally provided by RPC. Ajax is primarily used to build web applications with

Networks edge and technologies - computer networks , Networks Edge  and Te...

Networks Edge  and Technologies Network  Edge  provides  information  exchange  between  the access network  and the core  network. The devices  and facilities in the network

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd